Introduction:Now, hacking or Cracking is a prime cyber crime

                                                         Introduction:Now, Cybercrime is commonplace and presentsnew challenges in the prevention of crime.Cybercrime is a illegal activity doneusing coputers and internets.

It is a unlawful acts with in a computers either atool or both. 1 In the cyber-crime, computercrime means criminal activity involving a computer. The computer may be used inthe discount of a crime or it may be the exact point. Net-crime means criminaluse of the Internet. Cyber-crimes are essentially a combination of these twoelements and that are committed against individuals or groups of individualswith a criminal motive to intentionally harm the reputation of the victim orcause physical or mental harm to the victim directly or indirectly using moderntelecommunication networks such as the Internet.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

 2In the growth ofthe internet, network security has become a major concern in the new era. Cybercrimes have gone out rapidly in the last few years and have major consequences.Cyber criminals are doing every thing from stealing moneyof persons, hide ofidentity,hacking into others computer, stealing intellectual property,spreading viruses and worms to damage computers connected on the internet andcommitting frauds.3Typesof Cyber CrimeCybercrime is defined as crimes committed on theinternet using computer as a tool or innocents are the target. There arevarious forms of cyber crime like as:1.Hacking.2. Online Scams3.

Malware4. Email Bombing5. Virus Dissemination6. Logic Bombs7. Theft8. Social Media Hack & Spamming9. Electronic Money Laundering10. Sales & Investment Fraud11.

Eavesdropping & Surveillance12. Software Piracy13. Data Diddling14. Salami Slicing Attack15.

Phishing Scams16. Cyber Stalking17. Cyber Bullying18. Identity Theft19. Child Soliciting & Abuse20. Ransomware.4         Hacking:Today, hacking or Cracking is a primecyber crime committed . Hacker makes use of the weaknesses and loop holes inoperating systems to destroy data information from victim’s computer.

Normally,Cracking is done through the use of a backdoor program installed on yourmachine. Many crackers also try to gain access to resources through the use ofpassword cracking softwares. Hackers can also monitor what u do on yourcomputer and also can import files on your computer. A hacker could installseveral programs on to your system in spite of your knowledge. This is also such programs could also be used to stealpersonal information such as passwords and credit card information. For thisreason,important data of a company can also be hacked to get the secretinformation of the future plans of the company.

Cyber-Theft:Now,Cyber-Theft is the use ofcomputers and communication systems to steal information and dat in electronicformat. Hackers crack this  into thesystems of banks and transfer money into their own bank accounts.As larger amountsof money can be stolen and illegally transferred into their own account.Viruses and worms:Viruses and worms is a great threat tonormal users and companies.

Viruses are computer programs that are alsodesigned to damage computers. It is named virus because it spreads from onecomputer to another as like as a biological virus. A virus must be attached to some other program  through which it enters the computer. Aworm  or virus usually exploits loopholes in softwares or the operating system.

5Hacking:Today, hacking or Cracking is a primecyber crime committed . Hacker makes use of the weaknesses and loop holes inoperating systems to destroy data information from victim’s computer. Normally,Cracking is done through the use of a backdoor program installed on yourmachine. Many crackers also try to gain access to resources through the use ofpassword cracking softwares.

Hackers can also monitor what u do on yourcomputer and also can import files on your computer. A hacker could installseveral programs on to your system in spite of your knowledge. This is also such programs could also be used to stealpersonal information such as passwords and credit card information. For thisreason,important data of a company can also be hacked to get the secretinformation of the future plans of the company.Cyber-Theft:Now,Cyber-Theft is the use ofcomputers and communication systems to steal information and dat in electronicformat. Hackers crack this  into thesystems of banks and transfer money into their own bank accounts.

As largeramounts of money can be stolen and illegally transferred into their ownaccount.Viruses and worms:Viruses and worms is a great threat tonormal users and companies. Viruses are computer programs that are alsodesigned to damage computers. It is named virus because it spreads from onecomputer to another as like as a biological virus.

A virus must be attached to some other program  through which it enters the computer. A worm  or virus usually exploits loop holes insoftwares or the operating system.5Reasons of cyber-crime:There are many technical reasons behind these crimes. Sometechnical reasons behind cyber crimes are as follows:Lackof reporting and standards,Tough to identify,Limited media coverage,Leastmarginal cost of online activity due to global reach,A very few rate of Official investigation and criminal prosecution,Capabilityof computer to store data in comparatively small space,Easy to access,Complexitiesin operating systems code,Lake of evidence,Negligence,Loopholes in systems,Confidentialinformation in online3.

Such as:1. Capacity to store informationin comparatively small space:-The computer has aunique characteristic of storing information in a very small space. This allowsfor much easier access of information through either physical or virtual media.2.Easy to access:-Now,The problemsencountered in guarding a computer system from unauthorised access are thatthere is every possibility of unauthorised access not due to human error butdue to the complex technology. In the secretly implanted a logic bomb, keyloggers that can steal access codes, advanced voice recorders; retina imagersetc. 3.

Complex-In the computers workon operating systems and these operating systems in turn are composed ofmillions of lines of code. The human mind is also fallible and it is notpossible that there might not be a lapse at any stage. The cyber criminals takeadvantage of these lacunas and penetrate into the computer system using oftenmore sophisticated means than originally anticipated by the systems engineers.4. Negligence:- In this crime,Negligenceis very closely connected with human conduct.

It is therefore very probablethat while protecting the computer system there might be any negligence, whichin turn provides a cyber criminal to gain access and control over the computersystem. This negligence is usually a property of under resourced IT securityprovisions and the improvement of security barriers within software packagesand network structures could lead to improved security.5.

 Loss of evidence:- Loss of evidenceis a very common & obvious problem as all the data is routinely destroyedfrequently. Further collection of data outside the territorial extent alsoparalyses this system of crime investigation.6  Ways to fight cybercrime by individuals:To fight back the individual should beproactive, not reactive We do not have to remain at the receiving end of crimeforever. The fight against cyber crime starts in our very own home .We shouldnot reply any e-mail from unknown persons, we should learn to report spam mailsto the e-mail servers .We should not upload our personal information on socialnetworking sites or our account details on other such sites.

Also the useantivirus soft wares can be a great help to fight against viruses and worms.7 Solutions:An important question arises canthese crimes be prevented.So, A number of techniques and solutions have beenpresented but the problems still exists and are increasing day by day.

Antivirus And Anti spywareSoftware:?ntivirus software consists ofcomputer programs that attempt to identify, thwart and eliminate computerviruses and other malicious software also used. Anti spy wares are used torestrict backdoor program, trojans and other spy wares to be installed and run onthe computer.5Conclusion: We can not thinkour daily life without computer as well as internet. The advantages of internetand computer can not be described in one word. But they have also some demeritsas like cyber crimes. Its also became a part of our life.

Criminals and victimsboth are the part of our society. Now, the rate of various types of cybercrimes increases rapidly. It must be reduced by keeping proper steps that’s arealready discussed in this paper for keeping safe our personal and private dataand information ,ensure the security of all types of websites and makingour  society clean & peaceful.8